Configuring security for Control Center requires planning and needs to be done carefully.
Because Control Center relies on Kafka Connect, Apache Kafka® brokers, Kafka Streams, interceptors and metrics
reporters to work properly, there
are numerous options that could be set depending on a particular environment or requirement.

Confluent recommends reviewing Kafka Security and the associated components before
configuring security for Control Center.

Important

After a component is secured, it will be unable to communicate with other non-secured components. For instance,
if you have a secured Kafka broker and a secured Control Center, but you have not secured Connect,
Control Center will behave sporadically when you attempt to use or view it. Be sure to secure all components in your
environment.